Journal Article A Sequent Calculus for Counterfactual Reasoning (CMU-CyLab-17-003) 2017 McCall M, Loh LK, Jia L
Conference Distributed Provenance Compression 2017 • Proceedings / ACM-SIGMOD International Conference on Management of Data. ACM-Sigmod International Conference on Management of Data • 203-218 Chen C, Lehri HT, Loh LK, Alur A, Jia L, Loo BT, Zhou W
Conference Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes 2017 • PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17) • 1501-1510 Surbatovich M, Aljuraidan J, Bauer L, Das A, Jia L
Conference Timing-Sensitive Noninterference through Composition 2017 • Lecture Notes in Computer Science • 10204:3-25 Rafnsson W, Jia L, Bauer L
Journal Article Monitors and Blame Assignment for Higher-Order Session Types 2016 • ACM Sigplan Notices • 51(1):582-594 Jia L, Gommerstadt H, Pfenning F
Journal Article Monitors and blame assignment for higher-order session types 2016 • ACM Sigplan Notices • 51(1):582-594 Jia L, Gommerstadt H, Pfenning F
Conference UBERSPARK: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor 2016 • PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM • 87-104 Vasudevan A, Chaki S, Maniatis P, Jia L, Datta A
Conference A Logic of Programs with Interface-confined Code 2015 • Proceedings of the Computer Security Foundations Workshop • 512-525 Jia L, Sen S, Garg D, Datta A
Preprint A Program Logic for Verifying Secure Routing Protocols 2015 Chen C, Jia L, Xu H, Luo C, Zhou W, Loo BT
Journal Article A PROGRAM LOGIC FOR VERIFYING SECURE ROUTING PROTOCOLS 2015 • Logical Methods in Computer Science • 11(4): Chen C, Jia L, Xu H, Luo C, Zhou W, Loo BT
Conference Automated Verification of Safety Properties of Declarative Networking Programs 2015 • PROCEEDINGS OF THE 17TH INTERNATIONAL SYMPOSIUM ON PRINCIPLES AND PRACTICE OF DECLARATIVE PROGRAMMING (PPDP 2015) • 79-90 Chen C, Loh LK, Jia L, Zhou W, Loo BT
Conference Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits 2015 • Proceedings of the ACM Conference on Computer and Communications Security • 1130-1143 Chowdhury O, Garg D, Jia L, Datta A
Preprint Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits 2015 Chowdhury O, Garg D, Jia L, Datta A
Journal Article Logic of Programs with Interface-confined Code (CMU-CyLab-13-001) 2015 Jia L, Sen S, Garg D, Datta A
Journal Article Monitors and Blame Assignment for Higher-Order Session Types (CMU-CyLab-15-004) 2015 Jia L, Gommerstadt H, Pfenning F
Conference Preface 2015 • Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security, PLAS 2015 Clarkson M, Jia L
Conference Preface 2015 • Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security, PLAS 2015 Clarkson M, Jia L
Conference Run-time Monitoring and Formal Analysis of Information Flows in Chromium 2015 • 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) Bauer L, Cai S, Jia L, Passaro T, Stroucken M, Tian Y
Conference A Program Logic for Verifying Secure Routing Protocols 2014 • Lecture Notes in Computer Science • 8461:117-132 Chen C, Jia L, Xu H, Luo C, Zhou W, Loo BT
Conference Analyzing the Dangers Posed by Chrome Extensions 2014 • 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) • 184-192 Bauer L, Cai S, Jia L, Passaro T, Tian Y
Conference Android taint flow analysis for app sets 2014 • Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) • 1-6 Klieber W, Flynn L, Bhosale A, Jia L, Bauer L
Conference Continuous Tamper-Proof Logging Using TPM 2.0 2014 • Lecture Notes in Computer Science • 8564:19-36 Sinha A, Jia L, England P, Lorch JR
Journal Article Continuous Tamper-proof Logging using TPM2.0 2014 Sinha A, Jia L, England P, Lorch JR
Conference Lightweight Source Authentication and Path Validation 2014 • Computer Communication Review • 271-282 Kim TH-J, Basescu C, Jia L, Lee SB, Hu Y-C, Perrig A
Conference Lightweight source authentication and path validation 2014 • Proceedings of the 2014 ACM conference on SIGCOMM Kim TH-J, Basescu C, Jia L, Lee SB, Hu Y-C, Perrig A